Our Blog

“Old age is like a plane flying through a storm. Once you’re aboard there’s nothing you can do.” – Golda Meir Let’s set the context to begin with: the “cloud” is your infrastructure and data in someone else’s data center. Most components of this infrastructure have IP addresses and so are hackable. Worse still, your data

Mind the gap. If you’ve ever travelled on the London underground, you will be familiar with the line: “Please mind the gap between the train and the platform. Mind the gap”. This audible phrase reminds (or warns) passengers to be mindful of the spatial gap between the station platform and the train door. The first

Vendor: You do need this too! Practitioner: Really? Ok, I’ll have that (tool) too. Cyber security professionals have a unique reputation for being the “No, you can’t” department within an enterprise environment. The end user asks if they can do something, security says “No, you can’t”. Of course, next time they’re unlikely to come back

As a security practitioner, if you have, at some point in your career, had to answer the question: “why should security always impose difficulty on legitimate business users?”, you’re not alone. A lot of business users struggle to see the values that security adds to the business. It’s neither their fault not their responsibility to figure it